Whitepaper Library
 

systems

Results 351 - 375 of 3449Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: VMWare - vFabric     Published Date: May 15, 2012
Cloud computing is gaining widespread adoption, and for good reason. This paper highlights companies' confidence level in deploying custom Java applications in the cloud. Learn how to accelerate application deployment now!
Tags : 
virtualization, cloud computing, infrastructure, design and facilities
    
VMWare - vFabric
Published By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : 
fireeye, spear phishing attacks, cybercriminals, malware, malicious activities
    
FireEye
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices, data center
    
Red Hat
Published By: Red Hat     Published Date: May 01, 2013
A recent IDG Quick Poll reveals that enterprise decision makers understand OpenStack can help them build open-source systems. However, the challenges of deploying OpenStack make the Red Hat portfolio of open and hybrid technologies critical to getting up and running.
Tags : 
red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing, standard hardware, deployment, cloud providers, public clouds, virtual architecture, hybrid cloud portfolio, infrastructure
    
Red Hat
Published By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : 
social media, business intelligence, customer hub, crm, oracle
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
Talent management has moved to the top of the CEO’s agenda. In a 2012 global survey of CEOs and CFOs by the Economist Intelligence Unit, 53 percent of these leaders said that insufficient talent within their organization could harm them financially over the next 12 months. The number expressing financial concerns rose to 67 percent at organizations with more than 1,500 employees. Moreover, a full 83 percent of HR and business executives believe that talent programs need to be improved, according to Deloitte’s 2012 report Talent Edge 2020. With statistics like these, it’s no wonder there’s more pressure than ever on HR leaders to make the right talent decisions for their organizations and to source the right talent management systems to maximize the value of their workforce.
Tags : 
oracle, talent cloud, cloud, talent management
    
Oracle
Published By: Oracle     Published Date: Dec 31, 9999
Employee Services Systems and Technology Manager Trent Filth out talks about the benefits of choosing on-premises Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Talent management has moved to the top of the CEO’s agenda. In a 2012 global survey of CEOs and CFOs by the Economist Intelligence Unit, 53 percent of these leaders said that insufficient talent within their organization could harm them financially over the next 12 months. The number expressing financial concerns rose to 67 percent at organizations with more than 1,500 employees. Moreover, a full 83 percent of HR and business executives believe that talent programs need to be improved, according to Deloitte’s 2012 report Talent Edge 2020. With statistics like these, it’s no wonder there’s more pressure than ever on HR leaders to make the right talent decisions for their organizations and to source the right talent management systems to maximize the value of their workforce.
Tags : 
oracle, talent cloud, cloud, talent management
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Employee Services Systems and Technology Manager Trent Filthout talks about the benefits of choosing on-premises Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Lumeris     Published Date: Aug 04, 2014
For health plans, health systems and delegated payer operations, or health systems wanting to become their own payer, Lumeris’ turnkey outsourcing offers expert support to design, build, operate, measure, and optimize value-based health plan operations that can drive clinical and financial excellence. This can be evidenced by our ability to help clients achieve higher revenue, lower costs, higher market share, and meeting mandates for medical cost ratio contained in the Patient Protection and Affordable Care Act.
Tags : 
lumeris, health plan delivery, health plan operations, population health services, value based health plan operations, health plan outsourcing, operating a health plan
    
Lumeris
Published By: Venafi     Published Date: Mar 26, 2015
Lax SSH security and management can lead to significant gaps in security controls. Cybercriminals target these gaps to gain full access to sensitive, regulated, and valuable systems and data. Read the solution brief, Stop Unauthorized Privileged Access, to close these SSH security gaps and protect your business: • Learn about the top SSH vulnerabilities • Discover how to reduce risk of SSH key misuse • Develop a strategy to manage and secure SSH keys
Tags : 
ssh security, ssh management, security controls, ssh vulnerabilities
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks, cyber defense, vpn, dlp, privileged access, authentication systems
    
Venafi
Published By: SAP     Published Date: Nov 06, 2015
This report on a global survey among finance executives examines how finance must transform discrete processes and systems into a networked value chain and common technology platform and automate manual interventions. With the Ariba Network, SAP provides deep, real-time visibility into key data and connects finance to procurement, treasury and more.
Tags : 
finance functions, finance, cfo, finance executives, visibility, data, procurement
    
SAP
Published By: SAP     Published Date: Nov 16, 2015
This report on a global survey among finance executives examines how finance must transform discrete processes and systems into a networked value chain and common technology platform and automate manual interventions. With the Ariba Network, SAP provides deep, real-time visibility into key data and connects finance to procurement, treasury and more.
Tags : 
    
SAP
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Oracle     Published Date: May 15, 2018
More than 75% of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. To help you navigate your own journey to modernization, we’ve crafted this handbook series to share the knowledge gained working with many thousands of companies using both legacy and modern ERP systems.
Tags : 
    
Oracle
Published By: Pega     Published Date: May 24, 2016
Customers are evolving. They are evolving in the way they get information about products, what goes into making their purchase decision and ultimately how they buy. Businesses need to evolve and adapt how they manage their customer relationships. Customer Relationship Management (CRM) software was supposed to improve front-end customer engagement across marketing, sales and service. Unfortunately, most systems have the opposite result. Companies spend too much time integrating and maintaining disconnected systems and too little time nurturing relationships. Organizations need to transform their organizations from the inside out—embracing new processes and technologies that gathers, stores and gives them access to customer data so they gain more insight into their customers and therefore create more effective marketing and service programs. Download this Ebook and gain a better understanding of how a more robust CRM system can improve customer management.
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
The digital service revolution is well underway. For communications service providers (CSPs), it means going beyond traditional voice and data and upgrading their entire digital communications infrastructure. Research shows enterprise-class organizations are allocating heavy dollars towards communications solutions and prefer a single provider for digital services. This is a massive opportunity for CSPs to expand their services, generate more revenue, grow profit and increase market share. However, the majority of enterprises reported not receiving a consistently excellent experience with their most recent service contract. As a result, many switch to new providers. CSPs are losing credibility and the loyalty of their customers because of legacy and traditional systems that constrain their ability to act quickly. Enterprises are looking for CSPs who understand their complex business and can offer a full portfolio of digital services with quality and creativity to meet their needs.
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
Governments have long found it challenging to modernize legacy IT systems. Now comes pressure to offer digital government services. However, which takes priority? The answer is both. But rather than thinking linearly, the smart way is to execute simultaneously by standing a traditional IT approach on its head. Government agencies need to use technology to develop proactive and digital government services, from the outside in, from the perspective of the constituent, while making modernizing adjustments. To be successful, it is critical for government agencies to move beyond traditional development methodologies by adopting an agile development approach. But what are the challenges? How can they modernize massive projects already in the works? In short, how to get there? Download this E-bookand find out where government agencies are falling short and where they can improve regarding digitization.
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega
Published By: FusionOps     Published Date: Jun 15, 2016
The supply chain generates huge volumes of data captured in ERP, CRM, demand planning and other systems. Download this whitepaper to learn how FusionOps Machine Learning can provide companies with a more accurate, granular understanding of their business by harmonizing these disparate data sources in the cloud, and applying machine learning algorithms.
Tags : 
    
FusionOps
Published By: Panasonic Business Mobility Solutions     Published Date: Nov 15, 2016
As the food industry races to comply with the FDA Food Safety Modernization Act (FSMA), manufacturers are working to adopt more robust track and trace processes. A critical component to achieving compliance is the integration of automated data capture solutions throughout all stages of food production—from farm to table. This whitepaper examines technology considerations food manufacturers should weigh when implementing these systems, along with how to tackle the subsequent challenges that are sure to arise. Once the U.S. food industry understands how mobile solutions can enable track & traceability, manufacturers will be equipped with an efficient solution that not only helps to achieve regulatory compliance, but also improves overall business efficiencies.
Tags : 
    
Panasonic Business Mobility Solutions
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.